NIST LWC Hardware Reference Implementation of Ascon v1.2
☆34Aug 29, 2023Updated 2 years ago
Alternatives and similar repositories for ascon-hardware
Users that are interested in ascon-hardware are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- NIST LWC Hardware Design of Ascon with Protection against Power Side-Channel Attacks☆20Feb 22, 2023Updated 3 years ago
- Hardware implementations of the authenticated encryption design ASCON☆20Aug 21, 2017Updated 8 years ago
- Masked Ascon Software Implementations☆13May 3, 2022Updated 3 years ago
- Hardware Design of Ascon☆39Jan 20, 2026Updated 2 months ago
- deprecated. new repo: https://github.com/ascon/ascon-c☆11Dec 22, 2020Updated 5 years ago
- Development Package for the Hardware API for Lightweight Cryptography☆18Mar 27, 2025Updated 11 months ago
- A collection of Ascon implementations & documents (as submodules)☆54Dec 3, 2025Updated 3 months ago
- Verilog implementation of the ASCON lightweight authenticated encryption and hashing algorithm☆10Nov 27, 2024Updated last year
- Java implementation of the authenticated encryption algorithm Ascon☆17Oct 24, 2023Updated 2 years ago
- ☆23Jul 3, 2024Updated last year
- ☆12Jan 13, 2025Updated last year
- Tool to automatically search for linear characteristics☆39Jan 27, 2016Updated 10 years ago
- ☆84Nov 18, 2025Updated 4 months ago
- ☆19Jul 17, 2025Updated 8 months ago
- Implementation of Differential Power Analysis (DPA) and Correlation Power Analysis (CPA) attacks on AES-128☆26May 2, 2023Updated 2 years ago
- CocoAlma is an execution-aware tool for formal verification of masked implementations☆24Sep 26, 2024Updated last year
- Suite of symmetric cryptography primitives built on top of the ASCON permutation☆46Nov 18, 2024Updated last year
- ☆55Jun 20, 2024Updated last year
- A list of VHDL codes implementing cryptographic algorithms☆27Nov 29, 2021Updated 4 years ago
- Software optimized implementations of GIFT and GIFT-COFB☆18Mar 29, 2022Updated 3 years ago
- Artifact associated with CHES 2022 paper https://tches.iacr.org/index.php/TCHES/article/view/9817☆12Nov 10, 2023Updated 2 years ago
- simple PE parser☆12Mar 14, 2017Updated 9 years ago
- Side-Channel Analysis Library☆106Feb 10, 2026Updated last month
- A White-Box Masking Scheme Against Computational and Algebraic Attacks☆13Jan 6, 2021Updated 5 years ago
- pinata-csrf-tool☆13Dec 20, 2019Updated 6 years ago
- Raccoon Signature Scheme -- Reference Code☆13Jul 12, 2023Updated 2 years ago
- Implementation of the Snappy compression algorithm as a RoCC accelerator☆12Jul 29, 2019Updated 6 years ago
- An attack of the ASCAD dataset in 5 minutes☆11Sep 3, 2023Updated 2 years ago
- A white-box Speck implementation using self-equivalence encodings☆13Jun 25, 2022Updated 3 years ago
- PROLEAD - A Probing-Based Leakage Detection Tool for Hardware and Software FIESTA - Fault Injection Evaluation with Statistic…☆42Feb 11, 2026Updated last month
- ARCHIE is a QEMU-based architecture-independent fault evaluation tool, that is able to simulate transient and permanent instruction and d…☆33Mar 13, 2026Updated last week
- ZPrize entry for Accelerating NTT Operations on an FPGA☆16Nov 18, 2022Updated 3 years ago
- Beta Version of Cryptographic Fault Diagnosis Tool (VerFI)☆13Nov 6, 2020Updated 5 years ago
- ☆26Nov 14, 2025Updated 4 months ago
- RISC-V cryptography extensions standardisation work.☆408Mar 7, 2026Updated 2 weeks ago
- ☆33Apr 25, 2023Updated 2 years ago
- Open Source Braille embosser☆37Feb 27, 2026Updated 3 weeks ago
- ☆18Jan 18, 2019Updated 7 years ago
- A web GUI for Slurm job management☆12Feb 23, 2023Updated 3 years ago